Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 190
- Computer programming 156
- Application software 150
- Python (Computer program language) 140
- Programming 134
- Engineering & Applied Sciences 117
- JavaScript (Computer program language) 101
- Java (Computer program language) 96
- Programming languages (Electronic computers) 83
- Data processing 82
- Computer Science 79
- Design 73
- Computer software 72
- Computer programs 68
- Web site development 67
- Artificial intelligence 60
- Management 59
- Video games 59
- Software engineering 55
- Computer networks 51
- Design and construction 51
- C (Computer program language) 48
- Machine learning 47
- Programming Languages, Compilers, Interpreters 47
- Web sites 45
- Database management 43
- Operating systems (Computers) 43
- C++ (Computer program language) 41
- Computer animation 41
- Computer graphics 39
-
1961Publicado 2018Tabla de Contenidos: “…Field widgets -- Buttons -- Smart buttons -- Dynamic views -- On change events -- Dynamic attributes -- List views -- Search views -- Calendar views -- Graph and pivot views -- Other view types -- Summary -- Chapter 10: Kanban Views and Client-Side QWeb -- About Kanban boards -- Kanban views -- Designing Kanban views -- Priority, kanban state, and color -- Kanban card elements -- The Kanban card layout -- Adding a Kanban card option menu -- Actions in Kanban views -- The QWeb templating language -- The QWeb JavaScript evaluation context -- Dynamic attributes by string substitution - t-attf -- Dynamic attributes by expressions - t-att -- Loops - t-foreach -- Conditionals - t-if -- Rendering values - t-esc and t-raw -- Set values on variables - t-set -- Call and reuse other templates - t-call -- Dynamic attributes using dicts and lists -- Inheritance on Kanban views -- Custom CSS and JavaScript assets -- Summary -- Chapter 11: Reports and Server-Side QWeb -- Installing wkhtmltopdf -- Creating business reports -- QWeb report templates -- Presenting data in reports -- Rendering images -- Report totals -- Defining paper formats -- Enabling language translation in reports -- Reports based on custom SQL -- Summary -- Chapter 12: Creating Website Frontend Features -- Roadmap -- Our first web page -- Hello World! …”
Libro electrónico -
1962Publicado 2021Tabla de Contenidos: “…Implementing token-based authentication -- Checking Swagger UI -- Summary -- Chapter 10: Performance Enhancement with Redis -- Technical requirements -- In-memory caching in ASP.NET Core -- Enabling in-memory caching in ASP.NET Core -- Distributed caching -- Setting up and running Redis -- For Windows users -- For macOS users -- For Linux or Ubuntu users -- Implementing Redis in ASP.NET Core 5 -- Code update -- Summary -- Section 3: Frontend Development -- Chapter 11: Vue.js Fundamentals in a Todo App -- Technical requirements -- Starting a project using the Vue CLI -- Files and folders generated by the Vue CLI -- Getting started with a Vue component -- Writing a Vue component -- Common features in a Vue component -- Writing local states in a Vue component -- Adding a function in a Vue component -- Looping in an array in a Vue component -- If-else conditions in a Vue component -- Creating and passing props -- Life cycle hooks in a Vue component -- Summary -- Further reading -- Chapter 12: Using a UI Component Library and Creating Routes and Navigations -- Technical requirements -- Using a third-party UI component library -- Setting up a Vue.js project and installing a UI component library -- Other third-party UI libraries -- Adding navigation bars -- Writing page components -- Setting up Vue Router with lazy loading and eager loading -- Summary -- Chapter 13: Integrating a Vue.js Application with ASP.NET Core -- Technical requirements -- Putting ASP.NET Core Web API and a Vue.js app together as a single unit -- Introducing Cross-Origin Resource Sharing or CORS -- Enabling a CORS policy in ASP.NET Core -- Summary -- Chapter 14: Simplifying State Management with Vuex and Sending GET HTTP Requests -- Technical requirements -- Understanding complex state management -- Understanding global state -- Sending an HTTP request in Vue.js…”
Libro electrónico -
1963Publicado 2016Tabla de Contenidos: “…Chapter 7: Forensic Image Management -- Manage Image Compression -- Standard Linux Compression Tools -- EnCase EWF Compressed Format -- FTK SMART Compressed Format -- AFFlib Built-In Compression -- SquashFS Compressed Evidence Containers -- Manage Split Images -- The GNU split Command -- Split Images During Acquisition -- Access a Set of Split Image Files -- Reassemble a Split Image -- Verify the Integrity of a Forensic Image -- Verify the Hash Taken During Acquisition -- Recalculate the Hash of a Forensic Image -- Cryptographic Hashes of Split Raw Images -- Identify Mismatched Hash Windows -- Verify Signature and Timestamp -- Convert Between Image Formats -- Convert from Raw Images -- Convert from EnCase/E01 Format -- Convert from FTK Format -- Convert from AFF Format -- Secure an Image with Encryption -- GPG Encryption -- OpenSSL Encryption -- Forensic Format Built-In Encryption -- General Purpose Disk Encryption -- Disk Cloning and Duplication -- Prepare a Clone Disk -- Use HPA to Replicate Sector Size -- Write an Image File to a Clone Disk -- Image Transfer and Storage -- Write to Removable Media -- Inexpensive Disks for Storage and Transfer -- Perform Large Network Transfers -- Secure Wiping and Data Disposal -- Dispose of Individual Files -- Secure Wipe a Storage Device -- Issue ATA Security Erase Unit Commands -- Destroy Encrypted Disk Keys -- Closing Thoughts -- Chapter 8: Special Image Access Topics -- Forensically Acquired Image Files -- Raw Image Files with Loop Devices -- Forensic Format Image Files -- Prepare Boot Images with xmount -- VM Images -- QEMU QCOW2 -- VirtualBox VDI -- VMWare VMDK -- Microsoft VHD -- OS-Encrypted Filesystems -- Microsoft BitLocker -- Apple FileVault -- Linux LUKS -- TrueCrypt and VeraCrypt -- Closing Thoughts -- Chapter 9: Extracting Subsets of Forensic Images -- Assess Partition Layout and Filesystems…”
Libro electrónico -
1964Publicado 2023Tabla de Contenidos: “…Do you need conditionals, looping structures, and variables? -- The tradeoff between assertion and image recognition -- Designing your own system -- Toward specification by example -- Specification by example -- Low-code and no-code test automation -- Batch- and model-driven test automation -- This chapter is completely wrong -- Summary -- Chapter 5: Specialized Testing -- Technical requirements -- Understanding load and performance testing -- Getting to know the basics of load testing -- Setting up a load test -- Exploring security testing -- Security concepts -- Checking out common security vulnerabilities -- Learning about industry standards -- Investigating some security testing tools -- Delving into accessibility testing -- What is accessibility? …”
Libro electrónico -
1965por Hall, Vincent AustinTabla de Contenidos: “…-- Mentoring in the time of LLMs -- The Ripple Effect of Mentorship -- Elevating Standards in the Field -- Personal Growth Through Mentorship -- Supporting a Culture of Continuous Learning -- Section Summary -- Other Ways to Share Your Expertise and Work -- Blogging and Writing Articles -- Online Courses -- Open-Source Projects -- Running Workshops -- Social Media and Online Communities -- Section Summary -- Attend, Build, Network -- Speaking Engagements and Workshops -- Joining Professional Organizations -- Network with Peers and Experts -- Building Genuine Relationships -- Seeking Mentorship and Offering Support -- Section Summary -- New Approaches from LLMs -- Embracing Collaborative Coding -- Latest Developments in LLMs -- Section Summary -- Summary -- Bibliography -- Chapter 12: The Future of LLMs in Software Development -- Technical requirements -- Emerging trends in LLM technologies -- Multimodal LLMs -- Human-AI collaboration -- Multi-agent systems -- Generative business intelligence (Gen BI) -- Your wish is my command -- Future impacts -- Democratization of coding and more -- Feedback loop -- Harmful AI? -- Coming challenges and opportunities -- Legal -- Politics and government -- No jobs for humans? …”
Publicado 2024
Libro electrónico -
1966Publicado 2017Tabla de Contenidos: “…. -- There's more... -- See also -- Looping through items -- How to do it... -- How it works... -- There's more... -- See also -- Creating custom objects -- How to do it... -- How it works... -- There's more... -- See also -- Using debugger functions -- How to do it... -- How it works... -- There's more... -- See also -- Understanding the new execution policy -- How to do it... -- How it works... -- There's more... -- See also -- Using the Save-Help function -- How to do it... -- How it works... -- See also -- Working with script repositories -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 2: Exchange Management Shell Common Tasks -- Introduction -- Performing some basic steps -- Manually configuring remote PowerShell connections -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
1967Publicado 2023Tabla de Contenidos: “…Tagging ADefenseTower and APlayerAvatar member functions as UFUNCTION macros -- Adding components to the new actors -- Including component header files -- Defining private properties for these two components -- Adding public getter functions to the components -- Creating components in the class constructor -- Creating blueprints from the new actor classes -- Learning about the Unreal gameplay framework classes -- Locating and creating gameplay framework classes in Pangaea -- Learning about the PlayerController class -- Learning about the GameModeBase class -- GameState -- GameInstance -- Retrieving class instances from your code -- Using the Cast template function -- Summary -- Chapter 6: Creating Game Actors -- Technical requirements -- Setting up the player avatar -- Adding SpringArmComponent and CameraComponent to PlayerAvatar -- Initializing the player avatar -- Setting up the character's SkeletalMeshComponent -- Importing the character model -- Using the Hero skeletal mesh in BP_PlayerAvatar -- Replacing the game's player pawn -- Creating the player avatar's animation blueprint -- Creating the PlayerAvatarAnimInstance class -- Creating the ABP_PlayerAvatar blueprint -- Creating the State Machine on ABP_PlayerAvatar -- Syncing the movement speed with the animation instance -- Summary -- Chapter 7: Controlling Characters -- Technical requirements -- Controlling the player character to attack -- Adding the Attack action to the action map -- Binding the handler function to the Attack action -- Implementing the OnAttackPressed() action handler function -- Implementing the CanAttack() and Attack() functions -- Processing non-loop animations -- Implementing the OnStateAnimationEnds function -- Destroying actors -- Creating the enemy character -- Creating the Enemy class -- Creating the EnemyController class -- Creating the ABP_Enemy animation blueprint…”
Libro electrónico -
1968por Mueller, John, 1958-Tabla de Contenidos: “…Starting the List Project -- Adding the Controls -- Configuring the Controls -- Using the Code Editor -- Using the Double-Click Method -- Choosing an Event Directly -- Using the Right-Click Method -- Understanding the Code Editor Features -- Writing Some Simple Code -- Testing the List Application -- Tracing the List Application with the Debugger -- Discovering Application Functionality Through Tracing -- Creating a Breakpoint -- Viewing Application Data -- Testing a Theory -- Creating the List 2 Project -- Starting the Second List Project -- Copying the Controls -- Finessing the Controls -- Adding the Extended Code -- Tracing Through the Extended Example -- Understanding Data Types -- Testing Selection Theories -- Get Going with C# -- Using Collections to Store Data -- Understanding Arrays -- Creating the Array Project -- Starting the Array Project -- Adding the Array Project Controls -- Configuring the Array Project Controls -- Adding the Array Code -- Tracing Through the Array Example -- Testing Looping Theories -- Testing Conditional Theories -- Understanding Dictionaries -- Creating the Dictionary Project -- Starting the Dictionary Project -- Adding the Dictionary Project Controls -- Configuring the Dictionary Project Controls -- Adding the Dictionary Code -- Tracing Through the Dictionary Example -- Testing Sorting Theories -- Testing Statistical Theories -- Understanding Structures -- Creating the Structure Project -- Starting the Structure Project -- Adding the Structure Project Controls -- Configuring the Structure Project Controls -- Creating a Structure -- Adding the Structure Example Code -- Tracing Through the Structure Example -- Get Going with C# -- Working with XML -- Understanding XML -- Combining XML and LINQ -- Defining the XML_LINQ Project -- Adding and Configuring the XML_LINQ Controls -- Using the System.Xml.Linq Namespace…”
Publicado 2011
Libro electrónico -
1969Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Approaching a Penetration Test Using Metasploit -- Organizing a penetration test -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling -- Vulnerability analysis -- Exploitation and post-exploitation -- Reporting -- Mounting the environment -- Setting up Kali Linux in a virtual environment -- The fundamentals of Metasploit -- Conducting a penetration test with Metasploit -- Recalling the basics of Metasploit -- Benefits of penetration testing using Metasploit -- Open source -- Support for testing large networks and natural naming conventions -- Smart payload generation and switching mechanism -- Cleaner exits -- The GUI environment -- Case study - diving deep into an unknown network -- Gathering intelligence -- Using databases in Metasploit -- Modeling threats -- Vulnerability analysis - arbitrary file upload (unauthenticated) -- Attacking mechanism on the PhpCollab 2.5.1 application -- Exploitation and gaining access -- Escalating privileges with local root exploits -- Maintaining access with Metasploit -- Post-exploitation and pivoting -- Vulnerability analysis - SEH based buffer overflow -- Exploiting human errors by compromising Password Managers -- Revisiting the case study -- Revising the approach -- Summary and exercises -- Chapter 2: Reinventing Metasploit -- Ruby - the heart of Metasploit -- Creating your first Ruby program -- Interacting with the Ruby shell -- Defining methods in the shell -- Variables and data types in Ruby -- Working with strings -- Concatenating strings -- The substring function -- The split function -- Numbers and conversions in Ruby -- Conversions in Ruby -- Ranges in Ruby -- Arrays in Ruby -- Methods in Ruby -- Decision-making operators -- Loops in Ruby…”
Libro electrónico -
1970Publicado 2018Tabla de Contenidos: “…Nonlinear -- Pace/Speed -- Looping -- Cutting on Action/Matching Eyeline -- Montage -- Animation -- 2D Animation -- 3D Animation -- Real-Time Effects on Prerecorded Content -- Generative Art/Video as Content -- The Basics of Generative Art/Video -- Data as Content -- Interactive Systems as Content -- Meaning Making from Interactivity -- Live Video/Cameras -- Real-Time Effects on Live Cameras -- Rehearsing with Cameras -- To See a Camera Operator or Not? …”
Libro electrónico -
1971por Charlebois-Laprade, Nikolas. authorTabla de Contenidos: “…-- SharePoint Foundation versus SharePoint Server -- What You Will Learn in This Book -- Summary -- Chapter 2: What's New in PowerShell for SharePoint 2013 -- SharePoint 2013 Apps -- Service Applications -- User License Enforcements -- PowerShell Web Access -- Backups -- Bing Maps -- Search -- Tenants -- Office 365 -- Site Upgrade -- Summary -- Chapter 3: Configuring Your Environment for PowerShell -- Getting Started with the Integrated Scripting Environment (ISE) -- Windows Server 2008 R2 -- Windows Server 2012 -- Windows PowerShell ISE Essential Features -- IntelliSense -- Snippets -- Commands Explorer -- Execution Policy -- PowerShell Web Access (PWA) -- Requirements -- Installing PWA -- Configuring the Gateway -- Summary -- Chapter 4: PowerShell Basics -- Terminology -- Session -- Cmdlets -- Profile -- Snap-In -- Module -- PowerShell Operators and Common Operations -- Printing Values on Screen -- Console Colors -- Variables -- Comments -- Casting -- Conditional Logic -- Decisions -- Comparison -- Logical Operators -- Function -- Loops -- Piping -- Instance Referrer -- Error Handling -- Enumerations -- Arrays -- Environment Variables -- WhatIf Rollback -- Graphical User Interface -- Demo Project-Selective Deletion of Files in a Folder -- Customization -- My Profile -- Custom Modules -- Leaping Ahead -- Desired State Configuration -- Dynamic Method and Property Names -- Summary -- Chapter 5: Installing & -- Deploying SharePoint with PowerShell -- Requirements -- Hardware Requirements -- Software Requirements -- Roles and Features -- .NET Framework 3.5 -- Domain Controller -- Users and Groups -- Application Server Role…”
Publicado 2014
Libro electrónico -
1972por Gibbs, R. DennisTabla de Contenidos: “…-- Chapter 11 Testing -- How Traditional Waterfall Lifecycle Models Inhibit Testing -- Testing with Iterative Lifecycle Models -- Advantages of Testing with Iterative Development -- Prerequisites for Testing with Iterative Lifecycle Models -- The Different Types of Testing -- Functional Testing -- Unit Testing -- Reliability Testing -- Performance/Stress Testing -- Other Types of Testing -- Other Best Practices for Testing -- Involve Testing Expertise During Requirements Elicitation -- Keep Testing Staff in the Loop -- Replicate the Production Environment -- Testing Is Part of the Delivered Product -- Final Thoughts and Philosophies on Staffing for the Testing Discipline -- What if a Separate Team, Perhaps Offshore, Performs the Testing? …”
Publicado 2007
Libro electrónico -
1973Publicado 2020Tabla de Contenidos: “…10.8 Measures of Association -- 10.8.1 Kendall's τ -- 10.8.2 Spearman's Rho -- 10.9 Robust Concepts -- 10.9.1 Location Model -- 10.9.2 Linear Model -- 11 Bayesian Statistics -- 11.1 Bayesian Procedures -- 11.1.1 Prior and Posterior Distributions -- 11.1.2 Bayesian Point Estimation -- 11.1.3 Bayesian Interval Estimation -- 11.1.4 Bayesian Testing Procedures -- 11.1.5 Bayesian Sequential Procedures -- 11.2 More Bayesian Terminology and Ideas -- 11.3 Gibbs Sampler -- 11.4 Modern Bayesian Methods -- 11.4.1 Empirical Bayes -- A Mathematical Comments -- A.1 Regularity Conditions -- A.2 Sequences -- B R Primer -- B.1 Basics -- B.2 Probability Distributions -- B.3 R Functions -- B.4 Loops -- B.5 Input and Output -- B.6 Packages -- C Lists of Common Distributions -- D Tables of Distributions -- E References -- F Answers to Selected Exercises -- Index -- Back Cover…”
Libro electrónico -
1974Publicado 2024Tabla de Contenidos: “…Basics of shell scripting -- Creating a shell script file -- Variables in shell scripts -- Using mathematical expressions in shell scripts -- Using programming structures -- Using arrays in Bash -- Reading input data -- Formatting output data -- Understanding exit statuses and testing structures -- Using conditional if statements -- Using looping statements -- Working with functions -- Using sed and (g)awk commands -- Using scripts to showcase interprocess communication -- Shared storage -- Unnamed pipes -- Named pipes -- Sockets -- Scripting for administrative tasks -- Creating scripts for system administrative tasks -- Packaging scripts -- Summary -- Questions -- Further reading -- Chapter 9: Securing Linux -- Technical requirements -- Understanding Linux security -- Introducing SELinux -- Working with SELinux -- Introducing AppArmor -- Working with AppArmor -- Final considerations -- Working with firewalls -- Understanding the firewall chain -- Introducing Netfilter -- Working with iptables -- Introducing nftables -- Using firewall managers -- Summary -- Exercises -- Further reading -- Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting -- Technical requirements -- Planning for disaster recovery -- A brief introduction to risk management -- Risk calculation -- Designing a DRP -- Backing up and restoring the system -- Disk cloning solutions -- Introducing common Linux diagnostic tools for troubleshooting -- Tools for troubleshooting boot issues -- Tools for troubleshooting general system issues -- Tools for troubleshooting network issues -- Tools for troubleshooting hardware issues -- Summary -- Questions -- Further reading -- Part 3: Server Administration -- Chapter 11: Working with Virtual Machines -- Technical requirements -- Introduction to virtualization on Linux -- Efficiency in resource usage -- Introduction to hypervisors…”
Libro electrónico -
1975Publicado 2024Tabla de Contenidos: “…-- Summary -- Reference List -- 17 The Transportation Department -- Transportation Coordinator -- Transportation Captain -- More Transportation Crew -- Qualities of a Good Transportation Team -- Operations -- Picture Vehicles -- Production Vehicles -- Unions, Guilds, and Organizations -- Summary -- Part III Post-Production and Beyond -- 18 Post-Production -- Post-Production Supervisor -- Editor -- Assistant Editors -- Sound Designer -- Sound Editor -- Dialogue Editor -- Sound Effects Editor -- Music Editor -- ADR Editor -- Looping/ADR -- Re-Recording Mixers -- The Sound Mix -- The Post-Production Process -- The Digital Workflow -- Color Correction -- Main Titles and End Credits -- Unions, Guilds, and Organizations -- There's an App for That! …”
Libro electrónico -
1976Publicado 2019Tabla de Contenidos: “…The 2014-2015 Ebola Epidemic -- G. Phase-Locked Loops -- Chapter 6: Theory of Higher-Order Linear Differential Equations -- 6.1. …”
Libro electrónico -
1977Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Statistics Essentials -- Chapter 1: Getting Started with R -- Technical requirements -- Introducing R -- Covering the R and RStudio basics -- Common data types in R -- Common data structures in R -- Vector -- Matrix -- Data frame -- List -- Control logic in R -- Relational operators -- Logical operators -- Conditional statements -- Loops -- Exploring functions in R -- Summary -- Chapter 2: Data Processing with dplyr -- Technical requirements -- Introducing tidyverse and dplyr -- Data transformation with dplyr -- Slicing the dataset using the filter() function -- Sorting the dataset using the arrange() function -- Adding or changing a column using the mutate() function -- Selecting columns using the select() function -- Selecting the top rows using the top_n() function -- Combining the five verbs -- Introducing other verbs -- Data aggregation with dplyr -- Counting observations using the count() function -- Aggregating data via group_by() and summarize() -- Data merging with dplyr -- Case study - working with the Stack Overflow dataset -- Summary -- Chapter 3: Intermediate Data Processing -- Technical requirements -- Transforming categorical and numeric variables -- Recoding categorical variables -- Creating variables using case_when() -- Binning numeric variables using cut() -- Reshaping the DataFrame -- Converting from long format into wide format using spread() -- Converting from wide format into long format using gather() -- Manipulating string data -- Creating strings -- Converting numbers into strings -- Connecting strings -- Working with stringr -- Basics of stringr -- Pattern matching in a string -- Splitting a string -- Replacing a string -- Putting it together -- Introducing regular expressions -- Working with tidy text mining…”
Libro electrónico -
1978Publicado 2024Tabla de Contenidos: “…Using API specifications in Postman -- Creating a mock server -- Validating requests -- Summary -- Chapter 4: Considerations for Good API Test Automation -- Technical requirements -- Exploratory and automated testing -- Exercise - considerations for good API test automation -- Writing good automation -- Types of API tests -- Organizing and structuring tests -- Creating the test structure -- Organizing the tests -- Environments -- Collection variables -- Choosing a variable scope -- Exercise - using variables -- Creating maintainable tests -- Using logging -- Test reports -- Creating repeatable tests -- Summary -- Chapter 5: Understanding Authorization Options -- Understanding API security -- Authorization in APIs -- Authentication in APIs -- API security in Postman -- Getting started with authorization in Postman -- Using Basic Auth -- Using bearer tokens -- Using API keys -- Using AWS Signature -- Using OAuth -- Setting up OAuth 2.0 in Postman -- OAuth 1.0 -- Digest authentication -- Hawk authentication -- Using NTLM authentication -- Using Akamai EdgeGrid -- Handling credentials in Postman safely -- Summary -- Chapter 6: Creating Test Validation Scripts -- Technical requirements -- Checking API responses -- Checking the status code in a response -- Using the pm.test method -- Using Chai assertions in Postman -- Try it out -- Checking the body of a response -- Checking whether the response contains a given string -- Checking JSON properties in the response -- Try it out -- Checking headers -- Custom assertion objects in Postman -- Creating your own tests -- Try it out -- Creating folder and collection tests -- Cleaning up after tests -- Setting up pre-request scripts -- Using variables in pre-request scripts -- Passing data between tests -- Building request workflows -- Looping over the current request -- Running requests in the collection runner…”
Libro electrónico -
1979Publicado 2024Tabla de Contenidos: “…Chapter 7: Querying Our Data, Part 2 - Postprocessing and Response Synthesis -- Technical requirements -- Re-ranking, transforming, and filtering nodes using postprocessors -- Exploring how postprocessors filter, transform, and re-rank nodes -- SimilarityPostprocessor -- KeywordNodePostprocessor -- PrevNextNodePostprocessor -- LongContextReorder -- PIINodePostprocessor and NERPIINodePostprocessor -- MetadataReplacementPostprocessor -- SentenceEmbeddingOptimizer -- Time-based postprocessors -- Re-ranking postprocessors -- Final thoughts about node postprocessors -- Understanding response synthesizers -- Implementing output parsing techniques -- Extracting structured outputs using output parsers -- Extracting structured outputs using Pydantic programs -- Building and using query engines -- Exploring different methods of building query engines -- Advanced uses of the QueryEngine interface -- Hands-on - building quizzes in PITS -- Summary -- Chapter 8: Building Chatbots and Agents with LlamaIndex -- Technical requirements -- Understanding chatbots and agents -- Discovering ChatEngine -- Understanding the different chat modes -- Implementing agentic strategies in our apps -- Building tools and ToolSpec classes for our agents -- Understanding reasoning loops -- OpenAIAgent -- ReActAgent -- How do we interact with agents? …”
Libro electrónico -
1980por OECDTabla de Contenidos: “…Improving the alignment between county development plans and relevant higher-level strategic planning documents -- Enhancing clarity about the actors involved in county development plan implementation -- More specific objectives and performance indicators can foster targeted policy action and facilitate monitoring and evaluation -- Incentives for implementing county development plans -- There is a lack of financial incentives for the implementation of county development plans -- Areas for improvement in the local-level strategic planning process -- Additional incentives for inter-municipal co-operation could strengthen local strategic planning -- Opportunities to build the strategic planning skills of local governments -- Monitoring and evaluation of regional development in Croatia -- Institutional framework for monitoring and evaluation of regional development policy -- Croatia has adopted a clear and shared definition of monitoring and evaluation -- Legislation provides high-level guidance but the monitoring methodology could be further clarified -- Responsibilities for monitoring and evaluation across government are clearly defined in law, but may not always be fit-for-purpose -- Quality of regional development monitoring and evaluation -- Developing quality assurance and control mechanisms could improve the technical standard of evaluation reports -- A lack of access to, or awareness of, timely and granular data in Croatia constrains monitoring effectiveness -- Improving the quality of indicators can help policy makers track progress in meeting regional development objectives -- The impact of monitoring and evaluation evidence on regional development policy making -- Creating feedback loops through decision-making processes -- Communication of monitoring and evaluation results can be improved through the creation of a web searchable platform…”
Publicado 2024
Libro electrónico